期刊文献+

移动设备上移动代理应用的安全性研究 被引量:1

THE SECURITY RESEARCH OF MOBILE AGENT APPLICATION FOR MOBILE DEVICE
下载PDF
导出
摘要 移动代理的安全性问题一直制约着移动代理的广泛应用。以往的研究主要集中在解决移动代理安全的一般问题,但随着移动设备的大量普及,移动代理技术应用于这些受限设备,其适用场合和安全问题应区别对待。本文首先讨论了在这些移动设备上的移动代理典型应用,然后阐述了相关的安全问题及解决办法。最后给出了一个基于J2ME的实现范例,并提供了一些实验结果。 The security of mobile agent is one of the key problems that restrict its wide use. The foregone studies mainly focus on solving the general problems of the mobile agent. But as the Mobile Device are used more and more popularly,when we adopt the mobile agent technology to these limited devices the suitable cases and security problems are different from the traditional use. In this paper, we firstly discuss the typical application in the Mobile Device, and then describe the related security problems and some possible countermeasures. Finally we give a sample implementation based on the J2ME platform and show some experimental results.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第3期1-3,63,共4页 Computer Applications and Software
基金 国家自然科学基金(60173037和70271050) 江苏省自然科学基金(BK2003105) 国家高科技项目八六三(2002AA776032) 江苏省计算机信息处理技术重点实验室基金(kjs03061)资助
关键词 移动设备 移动代理 安全性 Moblie device Mobile agent Security
  • 相关文献

参考文献5

  • 1王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53
  • 2A.K.Dey:Understanding and Using Context,Personal and Ubiquitous Computing,Special Issue on Situated Interaction and Ubiquitous Computing,2001.
  • 3Sun Microsystems Inc.,Java 2 Platform,MicroEdition:http:∥java.sun.com/j2me/.
  • 4Sun Microsystems Inc.,CONNECTED DEVICE CONFIGURATION (CDC),http:∥java.sun.com/products/cdc/.
  • 5Sun Microsystems Inc.,J2ME RMI Optional Package(RMI OP),http:∥wwws.sun.com/software/communitysource/j2me/rmiop/index.html.

二级参考文献9

  • 1Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 2Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 3Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 4Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 5Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 6Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
  • 7Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
  • 8Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
  • 9Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989

共引文献52

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部